-
Data Security
Mar 29, 2020
9 Infamous APT Groups: Fast Fact Trading Cards
APT groups consist of capable and elusive members who wreak havoc on their targets — learn about infamous APT groups and their MOs through “trading cards”
Rob Sobers
4 min read
-
Data Security
Mar 29, 2020
The Difference Between E3 and E5 Office365 Features
Microsoft’s Enterprise Mobility and Security offerings are additional sets of security services that can be purchased to help control, audit and protect the data and users of Microsoft’s Azure and...
Michael Buckbee
3 min read
-
PowerShell
Mar 29, 2020
PowerShell Array Guide: How to Use and Create
Learn how to best use PowerShell arrays — we'll cover the basics of how to create them, work with them as well as some more advanced techniques.
Michael Buckbee
10 min read
-
Data Security PowerShell
Mar 29, 2020
PowerShell Obfuscation: Stealth Through Confusion, Part II
Let’s step back a little from the last post’s exercise in jumbling PowerShell commands. Obfuscating code as a technique to avoid detection by malware and virus scanners (or prevent reverse...
Michael Buckbee
3 min read
-
Data Security
Mar 29, 2020
A Guide on the Data Lifecycle: Identifying Where Your Data is Vulnerable
Data is a company’s most valuable asset. To maintain data’s value, it’s vital to identify where that data is vulnerable. According to data and ethics expert Dr. Gemma Galdon Clavell,...
Michael Buckbee
6 min read
-
Data Security
Mar 29, 2020
The Likelihood of a Cyber Attack Compared
The chances of experiencing a cyber attack are higher than you'd think. Take a look as we compare the odds.
Rob Sobers
1 min read
-
Data Security
Mar 29, 2020
It’s Here! The 2019 Global Data Risk Report Reveals Every Employee has Access to 17 Million Files
If you could take the temperature of data security risk at more than 700 enterprises around the globe, what would you find? Every year, Varonis gives the world a behind-the-scenes...
Rachel Hunt
1 min read
-
Data Security
Mar 29, 2020
Solving The Cybersecurity Skills Shortage Within Your Organization
As technology evolves and cyberattacks increase so does the gap in the cybersecurity workforce, read on to see tech shortage solutions for your business
Michael Buckbee
3 min read
-
Data Security Security Bulletins
Mar 29, 2020
Varonis DatAlert and IBM QRadar
Varonis now integrates with the IBM QRadar Security Intelligence Platform, with the Varonis App for QRadar. The Varonis App for QRadar adds context and security analytics to simplify investigations, streamline threat detection, and build...
Michael Buckbee
1 min read
-
Data Security
Mar 29, 2020
Best Practices for SharePoint Permissioning
SharePoint is Microsoft’s enterprise-class environment for sharing content: documents, presentations, spreadsheets, notes, images, and more. While SharePoint has many advantages over a raw file system in terms of content management,...
Jonathan Pistilli
4 min read
-
Security Bulletins
Mar 29, 2020
Data Classification Labels: Integrating with Microsoft Information Protection (MIP)
We’re thrilled to announce the beta release of Data Classification Labels: integrating with Microsoft Information Protection (MIP) to enable users to better track and secure sensitive files across enterprise data...
Michael Buckbee
1 min read
-
Data Security
Mar 29, 2020
Automating Permissions Cleanup: An In-Depth ROI Analysis
Previously, we discussed automating data access requests to achieve incredible ROI by cutting down on help desk tickets. We also briefly mentioned the enormous amount of work involved in finding...
Michael Buckbee
4 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital